A platform for research: civil engineering, architecture and urbanism
Merencanakan Keamanan Jaringan Komputer
Communication via wireless devices provides many benefits to companies and users, such as portability and flexibility, productivity improvement, and low installation fee. Wireless technology covers a variety of abilities on use and needs. A WLAN device as an example allows users to get mobile from a place to another without wires attached and connection loss. Wirelesss means more flexible, more efficient, and cost reduced. Adhoc network such as Bluetooth allows for data synchronization with network system and sharing application among devices. Bluetooth functions to diminish wires for printers and other supporting devices. Portable devices such as PDA and cell phone allow remote users to synchronize personal databases and provide accesses to email, browsing, and internet access. Thus, security risks are very influential on wireless network. Some of the risks are almost the same as the wired network, few are derived from other cable networks and some others are new.
Merencanakan Keamanan Jaringan Komputer
Communication via wireless devices provides many benefits to companies and users, such as portability and flexibility, productivity improvement, and low installation fee. Wireless technology covers a variety of abilities on use and needs. A WLAN device as an example allows users to get mobile from a place to another without wires attached and connection loss. Wirelesss means more flexible, more efficient, and cost reduced. Adhoc network such as Bluetooth allows for data synchronization with network system and sharing application among devices. Bluetooth functions to diminish wires for printers and other supporting devices. Portable devices such as PDA and cell phone allow remote users to synchronize personal databases and provide accesses to email, browsing, and internet access. Thus, security risks are very influential on wireless network. Some of the risks are almost the same as the wired network, few are derived from other cable networks and some others are new.
Merencanakan Keamanan Jaringan Komputer
Joni Suhartono (author)
2011
Article (Journal)
Electronic Resource
Unknown
Metadata by DOAJ is licensed under CC BY-SA 1.0
Audit Dan Investigasi Sistem Keamanan Jaringan Komputer Di Lingkungan Kampus
DOAJ | 2014
|Business Impact Analysis Sistem Dan Jaringan Komputer Menggunakan Metode Network Security Assessment
DOAJ | 2011
|